In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code. This only affect those running in Distributed mode.
In distributed mode, JMeter makes an architectural assumption that it is operating on a ‘safe’ network. i.e. everyone with access to the network is considered trusted.
References
- https://nvd.nist.gov/vuln/detail/CVE-2018-1287
- https://lists.apache.org/thread.html/31e0adbeca9d865ff74d0906b2248a41a1457cb54c1afbe5947df58b@%3Cissues.jmeter.apache.org%3E
- http://mail-archives.apache.org/mod_mbox/www-announce/201802.mbox/%3CCAH9fUpYsFx1%2Brwz1A%3Dmc7wAgbDHARyj1VrWNg41y9OySuL1mqw%40mail.gmail.com%3E
- https://github.com/apache/jmeter/issues/4677
- https://bz.apache.org/bugzilla/show_bug.cgi?id=62039
- https://github.com/advisories/GHSA-j7j7-g4ww-pxg5